Building trustworthy digital repositories : theory and implementation

書誌事項

Building trustworthy digital repositories : theory and implementation

[edited by] Philip C. Bantin

Rowman & Littlefield, [2016]

  • pbk. : alk. paper

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe. Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions: *What is a trustworthy repository for digital records? *Who is building these repositories, and what have been the results? *How are institutions building or creating these repositories? *How are institutions addressing the essential requirement related to the ingest or capture of records? *How are institutions automatically and manually capturing essential metadata and audit trails? *How are institutions implementing retention and disposal decisions within these systems? *How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time? *What is the current status of trustworthy repositories, and what will these systems look like in the future?

目次

Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin, What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources, Policies and Management Structures Theory Philip C. Bantin, Resources, Policies and Management Structures - Theory Implementation Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt, Ingest Process-Theory Implementation Cynthia Ghering, Ingest Process: Michigan State University's Digital Archives Program Jared Lyle, Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti, Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin, Creating and Capturing Metadata: Theory Implementation Mimi Dionne, Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan, Authenticity and Audit Trails - Theory Implementation Mimi Dionne, Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force, Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson, Creating an Access Strategy-Theory Implementation Debbie Bahn, Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans, Creating a Secure System - Theory Implementation Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley, Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti, What will Trustworthy Systems Look Like in the Future? Nancy McGovern, Current Status of Trustworthy Systems

「Nielsen BookData」 より

詳細情報

ページトップへ